Pass the GIAC Audit GSNA GSNA Questions and answers with CertsForce

Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following statements about packet filtering is true?

Options:

A.

It allows or restricts the flow of specific types of packets to provide security.


B.

It is used to send confidential data on the public network.


C.

It allows or restricts the flow of encrypted packets to provide security.


D.

It is used to store information about confidential data.


Expert Solution
Questions # 12:

Peter works as a Web Developer for XYZ CORP. He is developing a Web site for the company. In one of the Web pages, Peter wants to ensure that certain information is consistent and visible while the other information changes. Which of the following will he use to accomplish this?

Options:

A.

Tables


B.

Navigation links


C.

Data elements


D.

Frames


Expert Solution
Questions # 13:

You have been assigned a project to develop a Web site for a construction company. You have to develop a Web site and want to get more control over the appearance and presentation of your Web pages. You also want to increase the ability to precisely specify the location and appearance of the elements on a page and create special effects. You plan to use Cascading style sheets (CSS). You want to apply the same style consistently throughout your Web site. Which type of style sheet will you use?

Options:

A.

Internal Style Sheet


B.

External Style Sheet


C.

Inline Style Sheet


D.

Embedded Style Sheet


Expert Solution
Questions # 14:

Which of the following tools is a Windows-based commercial wireless LAN analyzer for IEEE 802.11b and supports all high level protocols such as TCP/IP, NetBEUI, and IPX?

Options:

A.

Sam Spade


B.

John the Ripper


C.

Cheops-ng


D.

AiroPeek


Expert Solution
Questions # 15:

You work as a Database Administrator for XYZ CORP. The company has a multi-platform network. The company requires a database that can receive data from various types of operating systems. You want to design a multidimensional database to accomplish the task. Which of the following statements are true about a multidimensional database?

Options:

A.

It is used to optimize Online Analytical Processing (OLAP) applications.


B.

It is used to optimize data warehouse.


C.

It is rarely created using input from existing relational databases.


D.

It allows users to ask questions that are related to summarizing business operations and trends.


Expert Solution
Questions # 16:

You work as a Network Auditor for XYZ CORP. The company has a Windows-based network. You use DumpSec as an auditing and reporting program for security issues. Which of the following statements is true about DumpSec? (Choose three)

Options:

A.

It obtains the DACLs for the registry.


B.

It dumps user and group information.


C.

It collates the DACLs for the file system.


D.

It kills the running services in the Windows environment.


Expert Solution
Questions # 17:

You work as a Network Administrator for XYZ CORP. The company has a Windows-based network. You want to configure the ACL with a Cisco router. Which of the following router prompts can you use to accomplish the task?

Options:

A.

router(config-if)#


B.

router(config)#


C.

router(config-ext-nacl)#


D.

router#


Expert Solution
Questions # 18:

You work as a Software Developer for Mansoft Inc. You create an application and use it to create users as members of the local Users group. Which of the following code snippets imperatively demands that the current user is a member of the local Users group?

Options:

A.

System.AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal); PrincipalPermission MyPermission = new PrincipalPermission(null, @"BUILTIN\Users", true); MyPermission.Demand();


B.

PrincipalPermission MyPermission = new PrincipalPermission(null, @"BUILTIN\Users", true); MyPermission.Demand();


C.

System.AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal); PrincipalPermission MyPermission = new PrincipalPermission(null, @"Users", true); MyPermission.Demand();


D.

PrincipalPermission MyPermission = new PrincipalPermission(null, @"Users", true); MyPermission.Demand();


Expert Solution
Questions # 19:

With reference to the given case study, one of the security goals requires to configure a secure connection between the Boston distribution center and the headquarters. You want to implement IP filter to fulfill the security requirements. How should you implement IP filters at the headquarters? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

Add source filters for the headquarters for UDP port 1701 and IP protocol 50.

Add destination filters for the Boston distribution center for UDP port 1701 and IP protocol 50.


B.

Add source filters for the Boston distribution center for UDP port 80 and IP protocol 50.

Add destination filters for headquarters for UDP port 80 and IP protocol 50.


C.

Add source filters for the headquarters for UDP port 80 and IP protocol 50.

Add destination filters for the Boston distribution center for UDP port 80 and IP protocol 50.


D.

Add source filters for the Boston distribution center for UDP port 1701 and IP protocol 50.

Add destination filters for the headquarters for UDP port 1701 and IP protocol 50.


Expert Solution
Questions # 20:

Which of the following can be the countermeasures to prevent NetBIOS NULL session enumeration in Windows 2000 operating systems?

Options:

A.

Denying all unauthorized inbound connections to TCP port 53


B.

Disabling SMB services entirely on individual hosts by unbinding WINS Client TCP/IP from the interface


C.

Editing the registry key HKLM\SYSTEM\CurrentControlSet\LSA and adding the value RestrictAnonymous


D.

Disabling TCP port 139/445


Expert Solution
Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions